1. Perform a similar function to viruses. However, they can replicate themselves through a network to spread to other computers, rather than through infecting files that are spread.

Test yourself on this resource another way...

...or combine it with others

Other questions in this quiz

2. Gathers information on the user it has infected, secretly sending it away to third-party sources – this may be through the use of keyloggers, which get information from what you type, such as passwords.

Rootkits

Viruses

Spyware

Trojans

3. Malicious code that hides within a seemingly legitimate program. Typically, users are misled and download the it themselves by thinking it’s a program they would like to use.

Spyware

Trojans

Adware

Viruses

4. Prevents you from accessing your computer system, often by encrypting the storage devices, and demands a sum of money to be paid in order to gain access back.

Adware

Ransomware

Rootkits

Viruses

5. Used to get unauthorised remote administrator access to a computer or network. They typically spread by hiding in software that appears to offer legitimate functionality. This can then be used to steal data or hide other malware within the system.